Ethical Hacking By: Erin Noonan
What Is Ethical Hacking? -When independent computer security professionals attempt to break into computer systems
Why do they exist? -To find new ways to approach hacker problems -Best way to evaluate the intruder
How do they operate? Attempt same tools and techniques as intruders Would not damage systems or steal information Evaluate target systems’ security and report vulnerabilities back to owners Provide them with instructions on how to fix these problems
Ethical hacking has been in use since the early days of computers.
NetWorks Group Most effective way to test a security system on behalf of it’s owners Uncovers vulnerabilities that could be exploited my a hacker Problems are discovered and reported so they can be properly fixed
NetWorks Group Performed by a dedicated team consisting of highly-skilled, focused, and experienced security consultants Test for over 25,000 vulnerabilities, logic flow problems, and other risks.
NetWorks Group’s Methodology Discovery Vulnerability Scan Verification and manual testing Exploit Findings reported Heavy emphasis on deliverables Clear and accurate information conveyed on both a technical and business level
NetWorks Group Hackers Based in Washington DC Average experience of 10 years in IT Security Department of Defense Top Secret Clearances Six Industry Certifications from various organizations
The Three Basic Questions What can an intruder see on the target systems? What can an intruder do with that information? Does anyone at the target notice the intruder’s attempts?
Every website is a target!